It's really easy to point fingers at them and say, "man, what
chumps." But the reality is none of us on this list are different
than they are. We're human, with the same foibles and weaknesses, and
I'm pretty sure Robin Sage would rip through this mailing list like a
chainsaw.
For that matter, E
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2014-11-21 03:54, Shea Levy wrote:
> Hmm, I’m having a hard time imagining how someone could get me to
> divulge the passphrase if they couldn’t also get me to hand over
> the key backups I own. Of course, my imagination is not the limit
> here,
A keystroke logger?
Jeremy
On 20 November 2014 16:54, Shea Levy wrote:
> Hmm, I’m having a hard time imagining how someone could get me to divulge
> the passphrase if they couldn’t also get me to hand over the key backups I
> own. Of course, my imagination is not the limit here, so is there so
Hmm, I’m having a hard time imagining how someone could get me to
divulge the passphrase if they couldn’t also get me to hand over the
key backups I own. Of course, my imagination is not the limit here,
so is there something I’m missing?
http://en.wikipedia.org/wiki/Robin_Sage
The people fooled
Il 20/11/2014 18:33, Dave English ha scritto:
> Hint: do you always wear a hood over your head and the keyboard when entering
> your passphrase?
Could simply use different passphrases for regular use and backups...
BYtE,
Diego.
___
Gnupg-users mailin
Hint: do you always wear a hood over your head and the keyboard when entering
your passphrase?
ATB
Dave English
> On 20 Nov 2014, at 16:54, Shea Levy wrote:
>
> Hmm, I’m having a hard time imagining how someone could get me to divulge the
> passphrase if they couldn’t also get me to hand over
Hmm, I’m having a hard time imagining how someone could get me to divulge the
passphrase if they couldn’t also get me to hand over the key backups I own. Of
course, my imagination is not the limit here, so is there something I’m missing?
Thanks,
Shea
> On Nov 20, 2014, at 11:27 AM, Robert J. Ha
My private key is encrypted with a very strong passphrase (10 word
diceware [1], not written down, 129 bits of entropy). Given that, is it
safe to back it up on disks I don't control, such as a private S3 bucket
or a VPS? My intuition says yes, but I've learned to never trust my
intuition when it
Hi all,
My private key is encrypted with a very strong passphrase (10 word diceware
[1], not written down, 129 bits of entropy). Given that, is it safe to back it
up on disks I don't control, such as a private S3 bucket or a VPS? My intuition
says yes, but I've learned to never trust my intuiti